Trustworthiness-based Group Communication Protocols

被引:0
|
作者
Kouno, Kazuaki [1 ]
Aikebaier, Ailixier [2 ]
Enokido, Tomoya [3 ]
Takizawa, Makoto [1 ]
机构
[1] Hosei Univ, Tokyo, Japan
[2] NICT, Tokyo, Japan
[3] Rissho Univ, Tokyo, Japan
来源
2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014) | 2014年
关键词
Broadcast protocol; Group communicate protocol; Trustworthiness;
D O I
10.1109/NBiS.2014.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distributed applications, a group of multiple process are cooperating with each other by exchanging messages in underlying networks. A message sent by each process has to be delivered to every process in a group. In this paper, we discuss a protocol for reliably, efficiently transmitting messages to every operational process in a group. We assume that each process can send messages to only neighboring processes like wireless networks and scalable peer-to-peer (P2P) overlay networks. Here, a process sends a message to its neighboring processes and then each neighboring process forwards the message to its neighboring processes. In this paper, we propose a trustworthiness-based group communication protocol where only trustworthy neighboring processes forward messages. In order to reduce the number of messages, a trustworthy neighboring process is a process which can more reliably forward messages. We discuss how to obtain the trustworthiness of a process in networks and forward messages to every process through trustworthy processes. We discuss a reactive type of protocol to reliably deliver message to a destination process m a wireless network.
引用
收藏
页码:488 / 492
页数:5
相关论文
共 50 条
  • [1] Trustworthiness-based Broadcast Protocols in Wireless Networks
    Sugino, Miyu
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 125 - 132
  • [2] A New Trust Model for Trustworthiness-based Routing Protocols in Sensor Networks
    Yu, Ming
    Liu, Wei
    Xing, Tian
    2012 19TH INTERNATIONAL CONFERENCE MECHATRONICS AND MACHINE VISION IN PRACTICE (M2VIP), 2012, : 56 - 61
  • [3] Trustworthiness-based authorization delegation model
    Liao, Jun-Guo
    Hong, Fan
    Zhu, Geng-Ming
    Yang, Qiu-Wei
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1265 - 1270
  • [4] Trustworthiness-based Broadcast Algorithm in Scalable P2P Group
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 143 - 150
  • [5] Credential trustworthiness-based trust evaluation in grid
    Qu, XL
    Yang, XJ
    Xiang, G
    Zhou, HF
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 554 - 560
  • [6] A Trustworthiness-Based Distribution Model for Data Leakage Prevention
    YIN Fan1
    2. College of Computer Science
    3. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education
    WuhanUniversityJournalofNaturalSciences, 2010, 15 (03) : 205 - 209
  • [7] AT-RBAC:: An authentication trustworthiness-based RBAC model
    Wang, LW
    Wei, LF
    Liao, XK
    Wang, HM
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 343 - 350
  • [8] Trustworthiness-based dynamic access control for grid application
    Chen, Xu-Ri
    Xu, Wei-Min
    Shen, Wen-Feng
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2008, 35 (07): : 85 - 89
  • [9] Research on Trustworthiness-Based Grid Resource Selection Optimized Algorithm
    Xu Shun-fu
    Wang Bing
    Zhang Xue-jie
    Zheng Shi-ming
    Shao Rong-ming
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 627 - +
  • [10] Research on Trustworthiness-based Grid Resource Selection Optimized Algorithm
    Xu Shun-fu
    Wang Bing
    Zhang Xue-jie
    Zheng Shi-ming
    Shao Rong-ming
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 589 - 592